What we publish about ourselves

Tessaliq's receipts let a third party check what happened for a single verification. This page is meant to cover the complementary view — what happens across all verifications (volume, conformance rate, latency, which wallets interact with the verifier, which errors appear) — so that an auditor, a Relying Party or a curious reader does not need to take Tessaliq's word for the shape of the operation.

Inaugural report — Q2 2026

The first quarterly snapshot is targeted for early July 2026, covering April–June 2026. The dashboard itself is a work in progress — right now this page lists what the report will contain and what it will not, so the commitment is public before the data is.

Framing document : receipt spec §8, internal runbook reference docs/ops/observability.md.

What the report will contain

What will never appear in this report

Anonymisation rules

Cadence

Verify receipts yourself, programmatically

The @tessaliq/receipt-verifier library (MIT-licensed, source on GitHub) lets any third party — auditor, regulator, Relying Party, curious developer — verify a Tessaliq receipt JWT cryptographically without coordination with us. The library reads only the public, unauthenticated /.well-known/jwks.json endpoint, and supports fully air-gapped operation by accepting a pre-fetched JWKS.

Three lines of TypeScript :

import { verifyReceipt } from '@tessaliq/receipt-verifier'

const result = await verifyReceipt(receiptJwt)
if (result.valid) console.log(result.claims)

The receipt format specification (v1.0-draft) documents every claim, the cryptographic guarantees (§8) and the known limitations (§9). It is the source of truth that the library and the Tessaliq signer both implement against. The CHANGELOG tracks every change, and the package will be promoted from 0.1.0-draft to 1.0.0 once a real wallet end-to-end run has been verified through the library (see spec §10).

Not yet on npm — the publication is gated on Tessaliq incorporation. In the meantime, install via git dependency or clone-and-link as documented in the package README.

Why this exists

Verifier products typically return a boolean yes/no over an API call and keep the logs on their side. When an auditor asks for proof, the verifier hands over an extract — so the audit depends on the logs being accurate. Publishing aggregate metrics on a fixed cadence is one way to reduce how much of that depends on taking the verifier's word.

The per-verification receipt and this quarterly dashboard are the two surfaces that let a third party reconstruct the audit trail using the cryptography and the published aggregates, rather than direct access to Tessaliq's internal logs.